Oops, something went wrong, please try the following steps:

  1. Reload the page;
  2. Clear the cache in your browser;
  3. Try another browser;
  4. Disable/Enable VPN.

If these steps do not help, please contact our support at: [email protected] or use this link. We will get back to you as soon as possible.

Compliance and asset recovering at ChangeNOW

ChangeNOW’s crypto security is a multi‑layered effort: we use advanced infrastructure, stay in touch with international regulators, and focus on user awareness. Our goal is not only to provide a secure platform but also to help every user understand the risks and available tools.

ShieldSmall StarBig Star

Compliance and protection in action

We address suspicious activity related to illegal funds. Here are cases of our team blocking high-risk transactions.

Specific compliance measures

With rising phishing scams, user protection is critical. ChangeNOW uses controls and partnerships to address high-risk activity, defining our crypto security.

  • Identification and prevention of illicit transactions

    ChangeNOW uses automated monitoring and blockchain analytics to identify illicit fund attempts and suspicious transactions.

  • Contribution to security protocols and fraud mitigation

    We work in 70 jurisdictions with law enforcement to respond to requests and enhance fraud prevention.

  • Firm adherence to compliance policies

    Policies are reviewed to align with global AML/CFT standards, ensuring consistent enforcement.

  • Recourse mechanisms for users

    When transactions are blocked, users can submit inquiries and requests for review, ensuring transparency and fairness.

Cooperating with

  • Crystal Intelligence
  • AML Bot
  • Sumsub

Crypto user protection matters more than ever

ChangeNOW combines internal controls, compliance expertise, and trusted partners to act swiftly on high‑risk activity — a layered security approach focused on real threats and practical defense.

Principles

Foundational principles guiding our compliance and risk practices

  • AML/CFT compliance and KYC procedures

    ChangeNOW complies with Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) standards via:

    • automated transaction monitoring
    • blockchain analytics tools
    • cooperation with law enforcement upon valid requests

    Although ChangeNOW operates as a registration-free swap service, Know Your Customer (KYC) checks are performed selectively in suspicious cases or as required by partners. KYC is conducted through GDPR- and FATF-compliant third-party providers.

  • Risk-based approach to user verification

    Users receive explicit information about financial and operational risks related to cryptocurrency transactions. Risk disclosures are integrated throughout the platform — including educational content and legal disclaimers. ChangeNOW ensures all service descriptions are neutral, fact-based, and avoid misleading claims.

  • Risk-based approach to user verification

    We apply a risk-based approach to user verification and transaction monitoring. While universal KYC is not mandatory, every transaction undergoes scrutiny for suspicious activity through a combination of in-house and external risk controls.

  • User data protection

    ChangeNOW does not store sensitive user data. All data transmissions are encrypted, internal system access is strictly controlled and logged. Privacy practices are aligned with European data protection regulations.

We value regulatory dialogue and ongoing improvement

If you wish to leave feedback, express concerns, or engage in a discussion, please reach out through:

[email protected]

For other enquiries, please contact our customer support.

Email us or fill in the form

Practical tips to protect your crypto assets

1Utilize non-custodial wallet

Keep your private keys in your own hands. With non-custodial wallets, your money is truly yours — not stored on someone else’s server.

2Enable 2FA where possible

Two-factor authentication significantly reduces the risk of unauthorized access by introducing a second factor of verification.

3Double-check addresses

Go from zero to hero with ChangeNOW. Earn crypto profit seamlessly, no coding skills required.

4Avoid unfamiliar links

Stay vigilant against phishing to protect your money. Avoid unknown downloads; they can compromise your device. In early 2025, phishing affected 43,628 victims, causing $39.33 million in losses.

5Keep your device updated

Do not ignore system and app updates. They have a habit of fixing security vulnerabilities that could otherwise be exploited by attackers.

6Use reputable platforms

Use services that describe their security processes in a clear manner and provide stable access to your money without unwarranted restrictions.